메뉴 건너뛰기




Volumn 3027, Issue , 2004, Pages 20-39

Positive results and techniques for obfuscation

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; APPLICATION PROGRAMS; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; PUBLIC KEY CRYPTOGRAPHY;

EID: 35048895442     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24676-3_2     Document Type: Article
Times cited : (168)

References (8)
  • 3
    • 0041916251 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation - Tools for software protection
    • The Department of Computer Science, University of Arizona, February
    • Christian Collberg and Clark Thomborson. Watermarking, tamper-proofing, and obfuscation - tools for software protection. Technical Report TR00-03, The Department of Computer Science, University of Arizona, February 2000.
    • (2000) Technical Report TR00-03
    • Collberg, C.1    Thomborson, C.2
  • 5
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs. Preliminary versions appeared at CRYPTO 1989 and STOC 1990
    • Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on oblivious RAMs. Preliminary versions appeared at CRYPTO 1989 and STOC 1990. Journal of the ACM, 43(3): 431-473, 1996.
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.